Category: WordPress Security Page 7/14

How to check individual WordPress themes and plugins for vulnerabilities

How to check individual WordPress themes and plugins for vulnerabilities

Here are some ways to check for vulnerabilities in WordPress themes and plugins.

Read more

Dangers of using nulled plugins and themes in WordPress

Dangers of using nulled plugins and themes in WordPress

There are websites that illegally release WordPress themes and plugins for free. This section explains the dangers of downloading and using themes and plug-ins from such sites.

Read more

Characteristics of malware code when WordPress is tampered with

Characteristics of malware code when WordPress is tampered with

We will explain what kind of malware (programs that perform malicious behavior) can be embedded in a site when WordPress is defaced by hackers.

Read more

Is it safer to run WordPress on a shared server?

Is it safer to run WordPress on a shared server?

We believe that installing and running WordPress on a shared server is more advantageous in terms of security, maintainability, and speed. We will explain the reasons for this.

Read more

Malware that displays a fake WordPress login screen and steals login information

Malware that displays a fake WordPress login screen and steals login information

Recently, malware that alters the JAVASCRIPT file of WordPress and uses it as a parasite to display a fake login screen and steal login information has been spreading.

Read more

New type of malware redirects to Russian mail-order sites only in some WordPress URLs

New type of malware redirects to Russian mail-order sites only in some WordPress URLs

We have discovered a new type of malware that redirects only some hierarchical WordPress URLs to Russian mail-order sites, and we would like to present an example of this malware.

Read more

10 Symptoms of WordPress hacked (tampered malware infection)

10 Symptoms of WordPress hacked (tampered malware infection)

This section describes 10 common symptoms of WordPress being hacked (tampering malware infection).

Read more

Be careful if the incorrect WordPress plugin Core Stab,Task Controller is in the plugin list!

Be careful if the incorrect WordPress plugin Core Stab,Task Controller is in the plugin list!

We will explain a new type of malware called Core Stab (core-stab) or Task Controller (task-controller), which is often found on the websites of our clients who request our malware removal services.

Read more

It is dangerous to get rid of WordPress malware infected sites one by one!

It is dangerous to get rid of WordPress malware infected sites one by one!

If you have multiple WordPress sites on multiple domains under a single contract, and it is clear that several of them are infected with malware (tampered with), it may be dangerous to repair them one by one.

Read more

Is updating the WordPress theme necessary for security purposes?

Is updating the WordPress theme necessary for security purposes?

We received a question from a client about whether WordPress “theme updates” are important for security purposes, so we would like to explain this.

Read more

Vulnerability in wordpress plugin yuzo related posts, plugin cannot be downloaded

Vulnerability in wordpress plugin yuzo related posts, plugin cannot be downloaded

There is a vulnerability in the wordpress plugin yuzo related posts, but no update has been released. this article explains how to resolve the vulnerability in yuzo related posts.

Read more

When WordPress is hacked, do you know the cause, date and time of the hack?

When WordPress is hacked, do you know the cause, date and time of the hack?

One of the rare questions we receive when WordPress Doctor recovers from malware or tampering on behalf of our clients is that they want to know the cause and date of the problem. Here is an explanation of how we can find out.

Read more

Vulnerability CVE-2023-22622 in WordPress 6.1.1 and below

Vulnerability CVE-2023-22622 in WordPress 6.1.1 and below

Recently, the international vulnerability database NIST has released CVE-2023-22622 as a vulnerability in WordPress 6.1.1 and below. The following is an explanation of the results of our investigation.

Read more

5 operations that are at high risk of WordPress sites being hacked and tampered with.

5 operations that are at high risk of WordPress sites being hacked and tampered with.

We will explain the five most dangerous ways to operate a WordPress site that can lead to it being hacked, defaced, sent to another site, or in the form of embedded malware. We hope that you will use this information as a lesson to the contrary.

Read more

A case of malware embedding where WordPress sends you to another site without your permission for robot verification.

A case of malware embedding where WordPress sends you to another site without your permission for robot verification.

There has been a recent increase in cases of redirect hacks where WordPress sites are redirected to another site for robot verification without permission. Here are some examples of this malware embedding and how to deal with it.

Read more

What to do when a red warning appears in the browser when accessing your (your company's) WordPress site

What to do when a red warning appears in the browser when accessing your (your company’s) WordPress site

Here is what to do when the browser screen turns red when accessing your (your company’s) site and a warning appears on that screen. Suddenly a warning screen appears when accessing the company’s website. When accessing your company’s website, the browser screen

Read more

What is a web shell, a type of WordPress malware?

What is a web shell, a type of WordPress malware?

There have been an increasing number of cases of web shells, a type of WordPress malware, becoming more sophisticated in recent years. We will explain about web shells.

Read more

Example of backdoor to plant malware code in $_HEADERS in WordPress

Example of backdoor to plant malware code in $_HEADERS in WordPress

We will explain about the type of backdoor that puts the main body of malware code in $_HEADERS, which has been increasingly detected in recent years.

Read more

Page 7/14